
CRJU 1300 Final Review
Authored by Brooke Thacker
Other
University
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
29 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The key difference to an investigator is that an intranet is often administered by how many authorities?
Five
Three
One
Two
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Recreational intrusions were a major issue in the early computer era.
True
False
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The single greatest problem in computer secure is:
Password protection
Hackers
Firewall
Encryption
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
To correctly assess and evaluate the existing information technology systems within an organization is what step of risk analysis?
Fourth
Second
First
Third
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Terrorist groups will increasingly use global networking is which forecast?
2
7
5
6
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is not a limitation of firewalls?
Have to be managed
Cannot stop proper use of legitimate services
Requires interaction among administrator and other users of network
Do not provide complete protection
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following are problems users faced in the early days of computing?
Capacity of hardware
Notable absence of security
Rudimentary networking
All of the above
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?